Information and communication technology : International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings /
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revis...
Saved in:
Corporate Authors: | ; |
---|---|
Group Author: | ; ; ; ; |
Published: |
Springer,
|
Publisher Address: | Berlin ; New York : |
Publication Dates: | 2013. |
Literature type: | eBook |
Language: | English |
Series: |
Lecture notes in computer science,
7804 LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI |
Subjects: | |
Online Access: |
http://dx.doi.org/10.1007/978-3-642-36818-9 |
Summary: |
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security. |
Item Description: |
International conference proceedings. Includes author index. |
Carrier Form: | 1 online resource (xvi, 552 pages) : illustrations (black and white). |
Bibliography: | With bibliogr. references. |
ISBN: |
9783642368189 (electronic bk.) 3642368182 (electronic bk.) 3642368174 (print) 9783642368172 (print) |
Index Number: | TK5105 |
CLC: | TP393-532 |
Contents: |
Information and Communication Technology- Eurasia Conference (ICT-EurAsia). E-Society. Translating the Idea of the eGovernment One-Stop-Shop in Indonesia / A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network / Early-Detection System for Cross-Language (Translated) Plagiarism / TransWiki: Supporting Translation Teaching / Physicians' Adoption of Electronic Medical Records: Model Development Using Ability - Motivation - Opportunity Framework / Software Engineering. Software Development Methods in the Internet of Things / SAT-Based Bounded Strong Satisfiability Checking of Reactive System Specifications / OSMF: A Framework for OSS Process Measurement / Analyzing Stability of Algorithmic Systems Using Algebraic Constructs / Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning / Security and Privacy. On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries / Semantic-Aware Obfuscation for Location Privacy at Database Level / Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch / CAPTCHA Suitable for Smartphones / Code Based KPD Scheme with Full Connectivity: Deterministic Merging / Cloud and Internet Computing. Indonesian Digital Natives / End-to-End Delay Performance for VoIP on LTE System in Access Network / Mobile Collaboration Technology in Engineering Asset Maintenance - What Technology, Organisation and People Approaches Are Required? / A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud / Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution / Knowledge Management. Information Systems Strategic Planning for a Naval Hospital / Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique / A Data-Driven Approach toward Building Dynamic Ontology / Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement / Asian Conference on Availability, Reliability and Security (AsiaARES). Dependable Systems and Applications. Secure and Verifiable Outsourcing of Sequence Comparisons / Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter / On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML) / DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation / On Identifying Proper Security Mechanisms / A Recovery Approach for SQLite History Recorders from YAFFS2 / UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors / SA4WSs: A Security Architecture for Web Services / Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation / A Test Case Generation Technique for VMM Fuzzing / A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet / A Proposal on Security Case Based on Common Criteria / An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors / Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks / Cryptography. Anonymous Lattice-Based Broadcast Encryption / Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance / New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation / Provably Secure and Subliminal-Free Variant of Schnorr Signature / A Block Cipher Mode of Operation with Two Keys / On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing / Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme / Privacy and Trust Management. A Simplified Privacy Preserving Message Delivery Protocol in VDTNs / Confidentiality-Preserving Query Execution of Fragmented Outsourced Data / Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control / Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol / A Real-Time Privacy Amplification Scheme in Quantum Key Distribution / Network Analysis and Security. CSP-Based General Detection Model of Network Covert Storage Channels / Trustworthy Opportunistic Access to the Internet of Services / Architecture of Network Environment for High-Risk Security Experimentation / Emulation on the Internet Prefix Hijacking Attack Impaction / Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction / Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge / An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs / A Review of Security Attacks on the GSM Standard / Multimedia Security. An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation / Image Watermarking Using Psychovisual Threshold over the Edge / A Data Structure for Efficient Biometric Identification / The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System / Shifting Primes on OpenRISC Processors with Hardware Multiplier / |